Analysis
-
max time kernel
145s -
max time network
103s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10/01/2023, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe
Resource
win10v2004-20221111-en
General
-
Target
dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe
-
Size
400KB
-
MD5
dec8166758db0d2672b232b9db99c5bb
-
SHA1
dd3e085e2fbc6ddd4f4621715840d390d7392b7d
-
SHA256
28639f3798751181839882904fe613d34f3cf09eab2756e54f441a3ea63fbc21
-
SHA512
e16b3eae2b65d9c66f73c4871ab82a09977ceb8b8f747403fda34a1ef15704c8391596da22fac2c00f718d47e95b300cbfb291c2f0a403f6da887e090f68566c
-
SSDEEP
12288:GmQJljkD8V8rdft6lAT7Rq1oC8qqYfBPNShBEBiBXB6BqXBSBksKBKzM6ToP2bGS:iwD86BsI7YpD
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 972 F4D55F6500014973000B9D42B4EB2331.exe -
Deletes itself 1 IoCs
pid Process 972 F4D55F6500014973000B9D42B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2000 dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe 2000 dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" F4D55F6500014973000B9D42B4EB2331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" F4D55F6500014973000B9D42B4EB2331.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B9D42B4EB2331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\svc F4D55F6500014973000B9D42B4EB2331.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\F4D55F6500014973000B9D42B4EB2331 = "C:\\ProgramData\\F4D55F6500014973000B9D42B4EB2331\\F4D55F6500014973000B9D42B4EB2331.exe" F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2000 dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe 2000 dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe 2000 dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe 2000 dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe 2000 dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe 2000 dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe 2000 dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 972 F4D55F6500014973000B9D42B4EB2331.exe 972 F4D55F6500014973000B9D42B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 972 2000 dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe 28 PID 2000 wrote to memory of 972 2000 dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe 28 PID 2000 wrote to memory of 972 2000 dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe 28 PID 2000 wrote to memory of 972 2000 dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe"C:\Users\Admin\AppData\Local\Temp\dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe"1⤵
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\ProgramData\F4D55F6500014973000B9D42B4EB2331\F4D55F6500014973000B9D42B4EB2331.exe"C:\ProgramData\F4D55F6500014973000B9D42B4EB2331\F4D55F6500014973000B9D42B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\dd3e085e2fbc6ddd4f4621715840d390d7392b7d.exe"2⤵
- Windows security bypass
- Executes dropped EXE
- Deletes itself
- Windows security modification
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:972
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD5dec8166758db0d2672b232b9db99c5bb
SHA1dd3e085e2fbc6ddd4f4621715840d390d7392b7d
SHA25628639f3798751181839882904fe613d34f3cf09eab2756e54f441a3ea63fbc21
SHA512e16b3eae2b65d9c66f73c4871ab82a09977ceb8b8f747403fda34a1ef15704c8391596da22fac2c00f718d47e95b300cbfb291c2f0a403f6da887e090f68566c
-
Filesize
400KB
MD5dec8166758db0d2672b232b9db99c5bb
SHA1dd3e085e2fbc6ddd4f4621715840d390d7392b7d
SHA25628639f3798751181839882904fe613d34f3cf09eab2756e54f441a3ea63fbc21
SHA512e16b3eae2b65d9c66f73c4871ab82a09977ceb8b8f747403fda34a1ef15704c8391596da22fac2c00f718d47e95b300cbfb291c2f0a403f6da887e090f68566c
-
Filesize
400KB
MD5dec8166758db0d2672b232b9db99c5bb
SHA1dd3e085e2fbc6ddd4f4621715840d390d7392b7d
SHA25628639f3798751181839882904fe613d34f3cf09eab2756e54f441a3ea63fbc21
SHA512e16b3eae2b65d9c66f73c4871ab82a09977ceb8b8f747403fda34a1ef15704c8391596da22fac2c00f718d47e95b300cbfb291c2f0a403f6da887e090f68566c
-
Filesize
400KB
MD5dec8166758db0d2672b232b9db99c5bb
SHA1dd3e085e2fbc6ddd4f4621715840d390d7392b7d
SHA25628639f3798751181839882904fe613d34f3cf09eab2756e54f441a3ea63fbc21
SHA512e16b3eae2b65d9c66f73c4871ab82a09977ceb8b8f747403fda34a1ef15704c8391596da22fac2c00f718d47e95b300cbfb291c2f0a403f6da887e090f68566c